GhostCall and GhostHire — two campaigns by BlueNoroff
GhostCall and GhostHire, two campaigns by the BlueNoroff APT group (a subgroup of Lazarus), target developers and executives in the crypto industry.
AI Analysis
Technical Summary
The BlueNoroff APT group, a Lazarus subgroup, has launched two coordinated campaigns named GhostCall and GhostHire targeting the cryptocurrency industry. GhostCall primarily targets executives using sophisticated social engineering, impersonating investors with stolen identities and even fragments of real video calls to establish trust. Victims are directed to fake Microsoft Teams or Zoom websites that prompt them to download malware disguised as client updates or fixes. The campaign mainly targets macOS platforms, reflecting the popularity of Apple devices among executives. GhostHire targets blockchain developers by offering fake job opportunities. Attackers use Telegram bots to provide test tasks hosted on GitHub or as downloadable archives. These tasks have tight deadlines to pressure victims into executing malware-laden files quickly. Both campaigns share a common command and control infrastructure and aim to steal cryptocurrency, credentials, and sensitive corporate information. The malware infection chains are complex, with at least seven identified in GhostCall alone, including previously unseen variants. No public exploits are known, indicating these are targeted, manual attacks rather than automated mass exploits. The campaigns demonstrate advanced social engineering combined with custom malware delivery tailored to the crypto sector's unique environment. Protection relies heavily on user awareness and endpoint security, as attackers exploit trust and urgency rather than software vulnerabilities. The campaigns highlight the evolving tactics of financially motivated APT groups focusing on high-value targets in emerging technology sectors.
Potential Impact
For European organizations, especially those involved in cryptocurrency, blockchain development, or fintech, these campaigns pose significant risks. Successful infections can lead to theft of cryptocurrency assets, compromise of sensitive credentials, and exposure of proprietary blockchain development secrets, potentially resulting in financial losses and reputational damage. Executives infected via GhostCall may inadvertently provide attackers with access to corporate networks or strategic plans, while developers compromised through GhostHire risk intellectual property theft and insertion of backdoors into blockchain projects. The focus on macOS devices among executives is notable, as Apple hardware is prevalent in European corporate environments. The targeted nature means that organizations with high-profile crypto operations or blockchain development teams are at elevated risk. Additionally, the use of social engineering and fake recruitment processes can undermine trust in legitimate hiring and investor communications. The campaigns could disrupt business continuity if malware includes data exfiltration or destructive components. Overall, the threat could impact confidentiality, integrity, and availability of critical assets in the European crypto sector.
Mitigation Recommendations
European organizations should implement tailored security awareness training focusing on the specific social engineering tactics used in GhostCall and GhostHire, emphasizing skepticism towards unsolicited investment meetings and job offers, especially those involving urgent download requests or unfamiliar communication channels like Telegram bots. Training should be role-specific, targeting executives and developers with simulated phishing and social engineering exercises. Deploy advanced endpoint protection solutions capable of detecting and blocking malware on macOS and other platforms, including behavioral analysis to identify suspicious downloads and execution. Enforce strict policies on software updates, ensuring updates are only applied through official channels. Monitor network traffic for connections to known command and control infrastructure associated with BlueNoroff. Implement multi-factor authentication and credential monitoring to detect potential compromise early. Establish clear procedures for verifying recruitment communications and investor meetings, including out-of-band verification of identities. Regularly audit and restrict permissions on developer systems to limit malware impact. Use threat intelligence feeds to stay updated on indicators of compromise related to these campaigns. Finally, encourage reporting of suspicious communications to security teams promptly to enable rapid incident response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Switzerland, Sweden
GhostCall and GhostHire — two campaigns by BlueNoroff
Description
GhostCall and GhostHire, two campaigns by the BlueNoroff APT group (a subgroup of Lazarus), target developers and executives in the crypto industry.
AI-Powered Analysis
Technical Analysis
The BlueNoroff APT group, a Lazarus subgroup, has launched two coordinated campaigns named GhostCall and GhostHire targeting the cryptocurrency industry. GhostCall primarily targets executives using sophisticated social engineering, impersonating investors with stolen identities and even fragments of real video calls to establish trust. Victims are directed to fake Microsoft Teams or Zoom websites that prompt them to download malware disguised as client updates or fixes. The campaign mainly targets macOS platforms, reflecting the popularity of Apple devices among executives. GhostHire targets blockchain developers by offering fake job opportunities. Attackers use Telegram bots to provide test tasks hosted on GitHub or as downloadable archives. These tasks have tight deadlines to pressure victims into executing malware-laden files quickly. Both campaigns share a common command and control infrastructure and aim to steal cryptocurrency, credentials, and sensitive corporate information. The malware infection chains are complex, with at least seven identified in GhostCall alone, including previously unseen variants. No public exploits are known, indicating these are targeted, manual attacks rather than automated mass exploits. The campaigns demonstrate advanced social engineering combined with custom malware delivery tailored to the crypto sector's unique environment. Protection relies heavily on user awareness and endpoint security, as attackers exploit trust and urgency rather than software vulnerabilities. The campaigns highlight the evolving tactics of financially motivated APT groups focusing on high-value targets in emerging technology sectors.
Potential Impact
For European organizations, especially those involved in cryptocurrency, blockchain development, or fintech, these campaigns pose significant risks. Successful infections can lead to theft of cryptocurrency assets, compromise of sensitive credentials, and exposure of proprietary blockchain development secrets, potentially resulting in financial losses and reputational damage. Executives infected via GhostCall may inadvertently provide attackers with access to corporate networks or strategic plans, while developers compromised through GhostHire risk intellectual property theft and insertion of backdoors into blockchain projects. The focus on macOS devices among executives is notable, as Apple hardware is prevalent in European corporate environments. The targeted nature means that organizations with high-profile crypto operations or blockchain development teams are at elevated risk. Additionally, the use of social engineering and fake recruitment processes can undermine trust in legitimate hiring and investor communications. The campaigns could disrupt business continuity if malware includes data exfiltration or destructive components. Overall, the threat could impact confidentiality, integrity, and availability of critical assets in the European crypto sector.
Mitigation Recommendations
European organizations should implement tailored security awareness training focusing on the specific social engineering tactics used in GhostCall and GhostHire, emphasizing skepticism towards unsolicited investment meetings and job offers, especially those involving urgent download requests or unfamiliar communication channels like Telegram bots. Training should be role-specific, targeting executives and developers with simulated phishing and social engineering exercises. Deploy advanced endpoint protection solutions capable of detecting and blocking malware on macOS and other platforms, including behavioral analysis to identify suspicious downloads and execution. Enforce strict policies on software updates, ensuring updates are only applied through official channels. Monitor network traffic for connections to known command and control infrastructure associated with BlueNoroff. Implement multi-factor authentication and credential monitoring to detect potential compromise early. Establish clear procedures for verifying recruitment communications and investor meetings, including out-of-band verification of identities. Regularly audit and restrict permissions on developer systems to limit malware impact. Use threat intelligence feeds to stay updated on indicators of compromise related to these campaigns. Finally, encourage reporting of suspicious communications to security teams promptly to enable rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/bluenoroff-ghostcall-ghosthire-lazarus/54681/","fetched":true,"fetchedAt":"2025-10-28T15:25:11.468Z","wordCount":996}
Threat ID: 6900e057d44cb7cb5001080e
Added to database: 10/28/2025, 3:25:11 PM
Last enriched: 10/28/2025, 3:25:26 PM
Last updated: 10/30/2025, 10:46:07 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54471: CWE-321: Use of Hard-coded Cryptographic Key in SUSE neuvector
MediumCVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.